instruction
stringlengths
24
29.9k
Apple has just announced iOS 8. The new version appears to be more extensible than previous versions, and one of the new possiblities is to allow developers to develop custom keyboards, different than the system's default. Android has had this feature for quite some time. On Android, those keyboards are known as a poss...
I'm developing a personal project and one part of the project is a php website, hosted at hostinger as a free plan, that allow clients to ping to it and stores the WAN IP and the NAT IP of them. They can ping to the web page just making a GET request to: mywebsite/ping.php?ip=XXX.XXX.XXX.XXX&description=USERNAME where...
If there is an employee uses the internet through an internal proxy in his company, and he use a paid VPN service to browse safely, can IT side be able to monitor his behavior?
I have been reading about SpyProxy. Can someone explain me this phrase I found in the article ? Here it is: We monitor the guest OS and browser through “triggers” installed to look for sandbox violations. I am looking to understand what is the nature of the triggers they may install in the Virtual Machine ? I appreciat...
I've been wondering about this scenario for a while but I cannot fully understand how it works. Say I am sitting in a cafe on my laptop with wireshark, the cafe has an open WiFi connection. Is it possible for my laptop to become a wireless access point (i will call it something similar to the cafe router) but then redi...
After reading about BitCoins, I can't help but contemplate the idea of the a government withdrawing paper money and bringing all currency transactions digital, via a bitcoin-like method where every unit (1 cent, US, for example) has an id and an owner. This would theoretically help eliminate theft, tax evasion, money ...
I know that hashing is a one way function and encrypted messages could be retrieved if you know the corresponding key to which you encrypted the message. Other than the ability to retrieve, what advantages/disadvantages are there in hashing over encryption?
Now, I understand this might not be the right place to post about Acunetix but I'm searching my site for any exploits and a couple of SQL Injection exploits have shown up on a /Profile page, how would I be able to see the issue through my own browser (i.e. See the SQL error through my own browser instead of the Acuneti...
What are the security implications of executing external processes using Java ProcessBuilder/Process? For example: Runtime rt = Runtime.getRuntime(); Process proc = rt.exec("processExecutable"); InputStream is = proc.getInputStream(); int c; while ((c = is.read()) != -1) { System.out.print((char) c); } int exitVal = ...
I'm a little bit confused about the contents of Finished Message used during Handshake Protocol. In particular, this message (clientside) contains the connection-id originally sent from the server and it also contains a hash value derived from all previous handshake message and master secret. So this message is encrypt...
I see a lot of materials in Internet about this technique. I'm not really interested in malwares, but I'm curious when you change bytes to an exe with other bytes, wouldn't this corrupt the exe? I can give example videos if somebody didn't understand my question.
The AES algorithm and asymmetric encryption use multiple key lengths that affect the strength on the key used. But, how does the key size and algorithm strength affect encryption strength?
i'm a newbie and i'm having a problem that i can't find it by google. I'm researching abbout DDoS detecting method now. As we can see that nowadays people often analyze networking traffic from router by a computer inside LAN. But i see that there're some companies which have services for traffic monitoring and packet ...
From Beginning Cryptography with Java - chapter 4, digital signatures: Signatures are created using the RSA algorithm by applying the RSA algorithm using the private key and then distributing the result as the signature. Because of the way the RSA algorithm works, this means the signature can be decrypted using ...
Consider a user who wants to use a password manager for their banking passwords. Advice from banks usually says they should never write down their password. The user would be concerned about going against that advice, as it could mean their bank would refuse to accept liability for any fraud that may occur on their acc...
Consider the problem of hardening an existing, database-backed web application, to detect attacks and stop them where possible. It seems like one plausible approach might be to build an intrusion detection system that has observability at two points: (a) at the web server level (e.g., to observe the page being executed...
Are heap spray exploits possible, if the process we're attacking is a 64-bit process? Naively, it seems like the 64-bit address makes it difficult to mount a heap spray: to fill all (or a significant fraction) of virtual memory, you'd need to spray an absolutely ridiculous amount of data into the heap. I realize that ...
In SSL/TLS handshake, a nonce is always sent by the client to server and vice versa. The nonce basically consists of a random number and unix timestamp. Why do we need the unix timestamp? As the nonce is always a random number, how does this protect from replay attack by a man-in-the-middle? Being a random thing, same...
So the first reason we give to encrypt content is to prevent against a man in the middle sniffing all data. That is the reason ssh is used and not telnet for example. But in today's networks where there are really no hubs and all switches how easy and how prevalent are packet sniffing attacks? What exactly needs to be...
Are there cases where a serious drive-by download attack could crash the operating system or the browser ?
How safe is a hybrid mobile application developed using a GET Web service over HTTPS? What are the pros and cons of using it and how safe is POST over HTTPS?
My office has about 20 PCs running Windows XP. I got a message saying that Microsoft is no longer releasing any security patches for Windows XP. However, we find that XP is very convenient for our work. Please suggest some possible ways to keep Using Windows XP for my PCs without any risk.
We have a long-standing ActiveSync device policy that requires an unlock code for all phones that use corporate email. It seems that iPhones with "swipe to unlock" and Android phones with similar technology process this policy different: iPhones allow a swipe to unlock feature, while Android does not. Is "swipe to unl...
I'm implementing a way for users to share messages with other users. All users and admin-users have a unique key pair. A message can be sent from one user to multiple users. Admin-users, who always have access to all messages, in case a user loses his password, and then makes a new password (with a forgot-password emai...
I have a classic ModSecurity configuration (apt-get...) SecRuleEngine Off SecPcreMatchLimit 1000 SecPcreMatchLimitRecursion 1000 SecAction "phase:1,t:none,nolog,pass, \ setvar:'tx.allowed_methods=GET HEAD POST OPTIONS', \ setvar:'tx.allowed_request_content_type=application/x-www-form-urlencoded multipart/form-data te...
If someone is able to post on the forum of my website links to executable files (malware) hosted on remote websites: can we say that my website suffers from a security hole ?
If I click on the little lock icon in Chrome it says that the site in question is using TLS v1. I also checked using openssl and was able to hit the site using TLS1, SSL2 and SSL3. From what I understand SSL2 is not secure. Based on this, it appears that the site could be hit using any of the three. What determines ...
There are multiple gift card reseller sites that buy your gift cards and resell them at discounted price. I was wondering how these sites prevent sellers from reusing the pin and card number after it has been sold (you can use the pin and card numbers online, or even at the store without the physical card).
I am 17 years old and my ultimate job goal is a cyber security professional. I have been extensively studying TCP/IP, along with all other subjects in the CompTIA Network+ certification which I hope to obtain soon. I'm very familiar with tools such as OpenVAS, Wireshark, nmap, ect and I'm currently learning Python, and...
According to https://www.owasp.org/index.php/Insufficient_Session-ID_Length: Assuming that the session identifiers are being generated using a good source of random numbers, we will estimate the number of bits of entropy in a session identifier to be half the total number of bits in the session identifier. How does o...
I've heard a TON of vague info on Gameover Zeus recently. One detail I can't seem to find is if it affects OSX? when I say I can't find it I mean from a credible source. I've found loads of people on forums saying the classic "Macs cant get viruses", but not any hard facts..
I really want to prove myself (to my parents) by winning a proper bug bounty How should I best prepare for this and go about actually finding bugs? Edit So can anyone give some web sites which I could read that would help me understand better how to win, and what free training materials are useful? I'm working through...
I'm wondering if anyone has previously proposed, evaluated, or deployed the following measure to harden systems against heap-based buffer overruns: basically, stack canaries, but applied before function pointers in objects stored in the heap rather than before return addresses stored in the stack. Consider a struct lik...
Is it possible to write a snort rule that match on 2 different flows? For instance on a communication from host-a <--> host-b that happen at the same time as a communication on host-a <--> host-c ?
On my Linux machine (Alice), I am setting up a service account with an rsync cron job that will synchronise some files with a remote host (Bob). Obviously, I would want to make the rsync secure by using SSH with a keypair. So my question is: is there any point in passphrase-protecting the private key? If I passphrase-p...
I'm trying to set secure Trusted Platform Module (TPM) passwords on a network and would like to set it to the maximum length possible. How long can the TPM's password be? Is it limited by bits or by characters? Does anyone has information about this? EDIT: Yes, it's TPM 2.0 modules, embedded on Dell laptops and desktop...
So pretty much all of the GNUTLS world is worrying about CVE-2014-3466. I checked my Kali and it responds with this - # apt-cache rdepends libgnutls26 | grep -v lib Reverse Depends: telepathy-gabble qemu-kvm guile-gnutls gnutls-bin xxxterm xpp xfprint4 xfce4-mailwatch-plugin xen-utils-4.1 x11vnc ...
http://seclab.stanford.edu/websec/csrf/csrf.pdf points out that most CSRF protection mechanisms fail to protect login forms. As https://stackoverflow.com/a/15350123/14731 explains: The vulnerability plays out like this: The attacker creates a host account on the trusted domain The attacker forges a login request in t...
I think I have a basic understanding of security concerns, but I feel like if I don't know everything, I'm going to implement lousy solutions. Below is my current strategy; Have I overlooked obvious best practices? I've read Can anyone provide references for implementing web application self password reset mechanisms p...
The media are currently (and have been) creating a huge ruckus surrounding the supposedly "undetectable" Gameover Zeus malware. The Daily Mail The Mirror The Independant PC World The Telegraph ...And a number of others. My question is... is there actually any increased risk to this particular malware, or are the medi...
To log in to a enterprise web app, our security team is insisting on 2FA as it is hosted on our internal network. The proposed solution is to have a standard username (email address) and password login, which will then trigger a four digit PIN emailed to the user which they will have to enter to log in. To my mind that...
I want to understand the technical aspect of BitLocker and TPM, especially with Startup PIN. Does anyone know a technical survey report, preferred by a competent third party (not MS)? I have a few questions about this topic If I use the BitLocker StartUp PIN, do I use the TPM like a smart card? Like a smart card, can ...
If two persons use the same router, which has an embedded WiFi access point, for accessing the Internet, is it possible that one can see HTTP traffic HTTPS traffic TOR traffic of the other in the below mentioned scenarios? Both connect to the router via its WiFi access point. One connects to the router via its WiFi ...
Suppose an attacker records all messages of a SSL handshake (RSA one-way), and starts a replay attack. When (after which message) can the server possibly detect the attack? Now suppose the attacker changes strategy, and sends the first three phases (up to the session key exchange), but sends this sequence many times. W...
I'm designing a system where some combination of hardware and software (lets call it an appliance...) sends asynchronous secure archival to the cloud. By secure, I mean, AES-256 encrypted, with AES key and IV encrypted by RSA-2048 public key. There may be several such appliances, each with the same RSA public key. It d...
I'm working for a company that sells software products to customers some of which do not have the resources and/or know-how to build and maintain their own CA (used for the SSL communication of our software). In these cases we have to provide the certificates for them. The customers are completely independent and shoul...
This is what facebook ships with their API php client: https://github.com/facebook/facebook-php-sdk-v4/blob/master/src/Facebook/fb_ca_chain_bundle.crt It contains dozens (hundreds?) Root CAs. But doesn't it make the client more prone to MitM attack? To clarify why I think: it's more chance that some of CA certificates ...
I have a reflected XSS vulnerability in my Web application. I have decided to take the black-list approach instead of the popular white-list approach. My question is can there exist a malicious javascript call without opening parenthesis(\u0028) and close paranthesis(\u0029)? By malicious, I mean something that can imp...
Does CVE-2014-0195 (openSSL) affect HTTPS or only VPN tunnels? Reference: https://security-tracker.debian.org/tracker/DSA-2950-1, https://isc.sans.edu/
Given a proxy performing MITM SSL decryption and inspection, is it possible to install a wildcard certificate (*.domain.com) on the proxy signed by a root CA (such as VeriSign or GoDaddy) such that clients will not have to have a self-signed cert installed (since they will already trust the root CAs in their trusted st...
I came across this link that dicusses how an attacker could exploit access control allow origin to get an anti-CSRF token: http://yossi-yakubov.blogspot.com/2011/09/bypassing-token-protection-against-csrf.html If the token in the above example was a one-use token (a new one is generated each time the page loads, and ex...
In our web application, we allow customers to enter their bank account information as a method of payment (account number, routing number, bank name). This information goes nowhere at all; it's up to the client to process such payments using a separate system. What, if anything, should we be doing to secure this data? ...
I'm trying to get access into a Windows 2000 server through the vulnerability MS03_026. An exploit is provided by Metasploit but I don't know why it isn't working. After filling the options (basically the RHOST) and running it, it just says "Sending exploit" and return the prompt. Port 135 is wide open. Playing with pa...
Microsoft deployed a patch for Windows 2012 R2 and Windows 8.1 that adds the following ciphers. Cipher suite Exchange Encryption Hash TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DH AES SHA384 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 DH AES SHA256 TLS_RSA_WITH_AES_256_GCM_SHA384 ...
This article describes how to disable old versions of TLS, but in addition to doing so, "Multi-Protocol Unified Hello" is also disabled. # Disable Multi-Protocol Unified Hello md 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\Multi-Protocol Unified Hello\Server' -Force New-ItemProperty -pa...
Are there any tools or techniques that allow a scan of multiple sites for the use of tracking cookies, beacons, web bugs, or offsite javascript includes? As far as I can tell, major web application scanners do not report on these attributes. One can manually navigate to sites using Ghostery and Disconnect, but doing so...
I'm trying to learn some attack methods by myself and I have hit a wall where I can't find any information. I have successfully performed an ARP MiTM between 2 systems and I am able to sniff the traffic using tcpdump, driftnet, etc. My question is: How can I actively modify the packets by injecting HTML code into the r...
Is the Double Submit Cookies mechanism vulnerable anything other than XSS and sub-domain attacks? All CSRF protection mechanisms are vulnerable to XSS, so that's nothing new. I'm just wondering if I can safely rely on this mechanism so long as I ensure I control all sub-domains. NOTE: This question is a spin-off of How...
I have run a heartbleed detector from Lookout on my Android phone. It says: The version of openSSL is affected by the heartbleed bug but the vulnerable behaviour is not enabled. What does it mean by not enabled? I can see /system/lib/libssl.so file on the phone and found openssl on it. It shows 1.0.1c. Does that m...
I have a server located in the USA and SSH to it from various places around the world. When I SSH in from a computer I have never used before, I'll see something like this: The authenticity of host 'my.usa.server.com (11.22.33.44)' can't be established. RSA key fingerprint is xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:b8:...
Is it safe to copy a private key from one computer to another over SCP? Does this depend on whether you use the same key to authenticate the transfer?
I won't really go into details of how cookie tossing and cookie overflow attacks work, because this answer explains it perfectly. This post on github explains some mitigation strategies, but does not talk about the case where a.domain.com can do malicious things to b.domain.com. The proposed solution is to host untrust...
Given that user needs to store a copy of the same private key on each of his devices (in order to decrypt email and other data encrypted with the public key) ... what are some general techniques for sharing and optionally removing the private keys from a user's various devices? Would a file sharing service suffice? Do...
I was wondering, a lot of software nowadays automatically connect to a server at launch to check for updates, even basic software, and, to my knowledge, this is a new trend. Before you had to download it all again from the website. My guess is that some of them weren't designed with security in mind and simply check a...
A website based on Apache Struts uses central authentication service (cas) for login. I'd like to know if additional csrf protection needs to be provided with Struts in case cas doesn't provide that. Also, when credentials are submitted, cas generates a token in URL form. If I copy this URL and use it later, the user i...
It is generally accepted that password change mechanisms should ask the user for their old password (e.g. OWASP) The reason being that an attacker who has temporary access to a user's session (be it through XSS, computer left logged-in, whatever) would only have access to that session. Presumably this principle should ...
I want to improve the security of my home wifi. My neighbor wants to crack my Wi-Fi password with a nutcracker. I tried to activate the protection by MAC address, but now my laptop and smartphone don't have access to the box. Is MAC address filtering effective? How else can I secure my Wi-Fi?
I know nmap is a port scanner and its output shows all the open ports, the services running on those ports, the underlying OS and technology, etc. What should one take from this result in easiest possible terms especially if someone is from application security background? This question may sound stupid but I would pre...
message confidentiality message integrity message authentication non-repudiation The 4 services are related in the sense that one services often implies/provides another. Indicate for each service which of the three other services are also provided? Message integrity means that message has been send and received with...
The OWASP state that open redirect is a vulnerability: An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it. However, it's trivial fo...
I'm overhauling our absolute time-bomb of an order processing system that would put us out of business tomorrow were we audited for PCI compliance. It's so amateur it's scary. I'm planning on making a case to the higher-ups that the liabilities of storing CC information outweigh the conveniences of not having to re-ask...
I want to buy a antivirus for my laptop.but I am in a fix.I want to buy such a antivirus that doesn't slow my laptop much.laptop configaration :processor core i5,Ram 4GB,operating system windows 7।please suggest me some best antiviruses. ..
According to RFC 5246, 7.1. Change Cipher Spec Protocol: The ChangeCipherSpec message is sent during the handshake after the security parameters have been agreed upon, but before the verifying Finished message is sent. And 6.1. Connection States: A TLS connection state is the operating environment of the TLS Record ...
To log in to our web app, our security team is insisting on 2FA as it is hosted on our internal network. The proposed solution is to have a standard username (email address) and password login, which will then trigger a four digit PIN emailed to the user which they will have to enter to log in. To my mind that is two s...
I am wondering if I did a Nessus scan using a Windows machine how it would log in to a Linux based device. Windows does not have a native ssh client. I am aware that Nessus will log into systems given credentials and scan from the inside out. Does Nessus install a ssh client or does it simply do external scan? I am...
I've been reading Whonix's documentation and threads here to be more anonymous and secure. For the best anonymity Whonix recommends having two different computers, one being the gateway and the other being the workstation. On the workstation, for the best anonymity and security, would it be wise to run Tails as a Live...
The status quo is that most online websites limit login attempts per IP address, or even per account since some attackers possess huge amounts of IP addresses. Removing login limits would have the advantage that attackers would no longer be able to fraudulently deny access (availability) to legitimate users, be it by I...
I want to know about some of the good resources for pen-testing cloud based services or web-apps (such as AWS). I googled for it but there are really few good resources out there. For example, I liked this article by SANS: http://pen-testing.sans.org/blog/2012/07/05/pen-testing-in-the-cloud Apart from this, does anyone...
I am currently reading "Metasploit: The Penetration Tester's Guide" and I came across the following paragraph in the book (in the 1st chapter) During intelligence gathering, you attempt to identify what protection mechanisms are in place at the target by slowly starting to probe its systems. For example, an organ...
I am trying to implement a copy protection (or licensing) mechanism for an android app. The app is not distributed through Google Play or other online market and instead it is distributed through media such as CD/DVD. So we cannot employ market based licensing methods. The app is a learning app for different levels of ...
I'm creating a file storage site and what I would do is just have the download links format as: https://www.domain.com/[id]/[file name] //id would just be 1, 2, 3 etc. Dropbox and many others have it similarly except that the IDs are long / hashed: https://www.dropbox.com/s/23d3kaz4adw9deq/anyfile.txt Is there any (s...
The management at work are asking, "How can we send files easily and safely to each other?", arguing that: Putting attachments in email is not safe. They want to send links instead They want to refer to a central, latest version of a file, rather than sending a copy They want to be able to read the file both on laptop...
I hope you won't close the question. Even though there are no computers involved, it is still about information and security, and I think that security experts are the ones who will be able to help best. I want to do some user research. I need people to fill out a questionnaire, and then fill out another questionnaire...
I want to block some part of a website or some videos from dailymotion or other site video sites. Type of network I have 7-8 devices(PCs, Mobiles, iPhones & tablets) all connected to a router (Tenda W150d) with wire or with wifi. I dont have a seperate server like offices to control traffic. Problems I can block web...
Some days ago, I was studying Web Programming for academic purposes. So I was learning SQL Injection by applying it on a sample website sqlzoo.net/hack/ But soon after it, in the Google ads on every page, every ad has been of "acunetix - Learn to prevent SQL Injection attacks". I don't get ads of other categories. Why ...
After reading many articles and watching many tutorials I decided to be specific because there are some things about SSL certificate chain verification and SSL cetificate verification in general that I couldn't verify against all the tutorials I have read nor the ones I watched. CASE 1: Let me take a case where I own a...
According to this post (and to my personal experience), installing the Skype app on Facebook and the Skype client on OSX Mavericks will result in you being logged out from Facebook every time you launch the Skype client. This question is not only to warn you of such an issue but to discuss what this could imply. It is ...
Started using OpenVPN on my desktop computer and monitored the traffic with Microsoft network monitor. What I noticed, is that when the openvpn session is initialized, only connections established after this point are routed through the VPN. That is to say I had to restart Skype to get it to route traffic through OpenV...
I am facing an XSS vulnerability in my ASP.Net Web application where the malicious code may be encrypted and html encoded Bottomline: I am trying to prevent XSS via code obfuscation. Question: I already know that I have to use HtmlDecode anyway.Is there a way to decrypt and then Html decode such data in ASP.Net?
I am looking for a way to safely store personal information with low entropy safely. I have the following requirements for the data: Must be able to search (i.e. to look up an existing piece of data) but not view Other systems must be able to recover the real value The system must be reasonably well performant (option...
How can I be sure my ISP encrypts my account password? I found out accidentally that mine did not. I had called to report an interruption in service, and in the process of "troubleshooting", the tech read my password off to me!! What can I do about this?
Is there any case-law where having or not having a legal notice (example here) in the login banner of a system of nay kind made a difference in prosecution? The question is in consideration both of "hacking" - "you must not access without authorization" and privacy - "everything is monited, no privacy expectations".
I would like to know if there is a DLP system that can monitor phone conversation, in order to search for sensitive data leakage by the company users to external users. We know NSA does that :) Is there a software/appliance that can handle such for a financial company against data leaks over phone calls? Thanks,
My father in law just had a problem,He clicked on a link in an email (he was using gmail on the version 35.0.1916.114m of Chrome), and suddenly the computer sort of went black, and possibly something downloaded. He says he didn't input his password. Later on, a whole bunch of phishing emails got sent out to his address...
I do free/low-cost web/shell hosting as a non-profit organization (With a the same friend and co-founder) since 2007. We're on CentOS 6 + CPanel, and unfortunately we're still funding the organization from our own money. Since last year, we've noticed some strange subdomains, additional domains and parking domains crea...
According to the CJIS Security Policy - Access Enforcement The information system shall enforce assigned authorizations for controlling access to the system and contained information. The information system controls shall restrict access to privileged functions (deployed in hardware, software, and firmware) and...
Is being online all the time the root of all evil, when it comes down to private computer clients security? Would a not-always-connected-to-the-internet system, solve most of our problems? In a concrete situation, I'd have a net computer (maybe booting from a Live CD) and a work computer (without internet). Both syste...
I'm going to preface this by saying I have absolutely no clue when it comes to cryptography, but I'm posting this question because I'm very interested and I have no doubt there are some smart people on here who will be able to explain this to me like I'm 5. So to my understanding md5 is considered insecure because of h...
I am trying to look at traffic between my phone and the outside world, and for whatever reason I can't see the outside world's traffic coming in. I am running Wireshark on a Kali box, I turned on the monitor mode interface, and then setup Wireshark to capture. I can see the outgoing traffic just fine, but can't see th...
As a software company who is looking at writing something that could handle debit cards can I self certify my software or do I have to have it tested by a 3rd party company?